100%
30.11.2025
friday 00:00-24:00
10 saturday 00:00-24:00
11 }
12
13 define timeperiod{
14 timeperiod_name wochentags
15 alias Robot Robot
96%
30.11.2025
YZCD
03 # DaemonOpts: -f /var/log/collectl -r00:00,7 -m -F60 -s+YZCD --iosize
04 ################################################################################
05 # Collectl: V3.6.1-4 HiRes: 1 Options
95%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple ... 6
86%
30.11.2025
# svcadm disable stmf
09 # fcinfo hba-port
10 ?
11 HBA Port WWN: 10000000c93805a6
12 Port Mode: Target
13 Port ID: 10200
14 OS Device Name: Not Applicable
15 Manufacturer: Emulex
16 Model: LP9002L
17 ?
18
86%
30.11.2025
is adding these entries to the Cobbler database. A typical example looks something like Listing 1.
Listing 1
System Settings
01 # cobbler system add --name=foo --profile=ksprofile-devel-rhel6 ... 6
82%
30.11.2025
.47
1,336.37
2,383.80
225.23
1.55
parse_int
1.44
16.50
815.19
6,454.50
337.52
2.17
quicksort
1.49
55
82%
30.11.2025
/sysconfig/network-scripts/ifcfg-eth0:
DEVICE=eth0
HWADDR=00:16:76:D6:C9:45
ONBOOT=yes
SLAVE=yes
USERCTL=no
Master=bond1
/etc/sysconfig/network-scripts/ifcfg-eth1:
DEVICE=eth0
HWADDR=00:16:76:D6:C9:45
ONBOOT=yes
SLAVE=yes
USERCTL
82%
30.11.2025
"creating" $vmname
09
10 virsh suspend rhstorage
11 virt-clone -o rhstorage -n $vmname -f /var/lib/libvirt/images/$vmname.qcow
12 virsh resume rhstorage
13
14 oldmac="52:54:00:B4:DF:EB"
15 newmac
81%
30.11.2025
saved in /home/khess/.ssh/id_rsa.pub.
09 the key fingerprint is:
10 6d:2c:04:dd:bf:b2:de:e1:fc:52:e9:7f:59:10:98:bb khess@windows
11 The key's randomart image is:
12 +--[ RSA 2048]----+
13 | .. . o
81%
30.11.2025
creates a 256MB file in the current directory along with process for the job. This process reads complete file content in random order. Fio records the areas that have already been read and reads each area